文件名称:CRC Press - Investigating Computer-Related Crime.7z
文件大小:1.35MB
文件格式:7Z
更新时间:2022-09-10 16:12:43
CRC Press Investigating Computer-Related Crime
Preface The introduction of the IBM Personal Computer in 1982 fostered a technology revolution that has changed the way the world does business. Prior to that historic milestone, several personal computers existed, e.g., Apple, TRS 80, but they were primarily used by individuals, schools, and small businesses. When computer main- frame giant, International Business Machines (IBM) entered the personal computer market in 1982, the event quickly captured the attention of corporations and gov- ernment agencies worldwide. Personal computers were no longer thought of as toys and almost overnight they were accepted as reliable business computers. Since their introduction, IBM PCs and compatible computers have evolved into powerful corporate network servers, desktop computers, and notebook computers. They have also migrated into millions of households, and their popularity exploded during the 1990s when the world discovered the Internet. The worldwide popularity of both personal computers and the Internet has been a mixed blessing. The immediate popularity of the IBM PC was not anticipated. The DOS operating system installed on the original personal computers back in 1982 was never intended for commercial use and therefore was not designed to be secure. In the interest of maintaining compatibility with the early versions of DOS, upgrades to the operating system could not adequately address security issues. As a result, most corporate desktop PCs and notebook computers lack adequate secu- rity. Millions of personal computers are used as tools to conduct financial transactions and to store trade secrets, sensitive personal medical data, and employment infor- mation. Many of these computers and more are also connected to the Internet to send and receive e-mail and to browse the wealth of information on the World Wide Web. The designers of the Internet never envisioned that it would become the hub of international commerce. As a result, security was not built into the original design of the Internet. The wide acceptance of the personal computer and the Internet has created some concerns for security that are just now being realized. The dramatic increase in computing speeds has added to the dilemma because such speeds aid hackers in breaking into systems. The inherent security problems associated with personal computers, tied to their popularity in the workplace, have fostered new corporate problems. Now internal audits involve the examination of computer records. Criminal investigations and civil investigations routinely involve computer evidence and such inquiries require new methods and tools for investigators and internal auditors alike. That is what this book is all about, and its coming has been long overdue. It deals with practical methods and techniques that have proven to be effective in law enforcement and ©2000 by CRC Press LLC military circles for years. Only recently has this type of information and tools been available to corporate auditors and investigators. Michael R. Anderson Mr. Anderson retired after 25 years of federal law enforcement service and is currently the president of New Technologies, Inc., a corporation that provides train- ing and develops specialized forensic tools for use in computer evidence processing. While employed by the federal government, he developed some of the original computer evidence training courses for the federal government and is currently a member of the faculty of the University of New Haven, Connecticut. He is also a co-founder of the International Association of Computer Investigative Specialists and is a training advisor to the National White Collar Crime Center. He can be reached via e-mail at mrande@teleport.com regarding computer evidence- and security review-related questions.
【文件预览】:
CRC Press - Investigating Computer-Related Crime - P. Stephenson (2000) WW.pdf